mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-11 21:07:23 +00:00
Windows improper acronyms-batch01
Task 6027362: This PR contains updates for the following acronyms:
This commit is contained in:
parent
18c77359e9
commit
d126554c16
@ -111,7 +111,7 @@ Back up all your data before installing Windows 10 in S mode. Only personal file
|
||||
|
||||
Windows 10 in S mode doesn't support non-Azure Active Directory domain accounts. Before installing Windows 10 in S mode, you must have at least one of these administrator accounts:
|
||||
- Local administrator
|
||||
- Microsoft Account (MSA) administrator
|
||||
- Microsoft account administrator
|
||||
- Azure Active Directory administrator
|
||||
|
||||
> [!WARNING]
|
||||
|
@ -50,10 +50,11 @@ You can create collections of apps within your private store. Collections allow
|
||||
You can add a collection to your private store from the private store, or from the details page for an app.
|
||||
|
||||
**From private store**
|
||||
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||
2. Click your private store.</br>
|
||||
|
||||

|
||||

|
||||
3. Click **Add a Collection**.</br>
|
||||
|
||||

|
||||
@ -65,6 +66,7 @@ You can add a collection to your private store from the private store, or from t
|
||||
> New collections require at least one app, or they will not be created.
|
||||
|
||||
**From app details page**
|
||||
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||
2. Click **Manage**, and then click **Products & services**.
|
||||
3. Under **Apps & software**, choose an app you want to include in a new collection.
|
||||
@ -84,12 +86,13 @@ If you've already added a Collection to your private store, you can easily add a
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||
2. Click your private store.</br>
|
||||
|
||||

|
||||

|
||||
|
||||
3. Click the ellipses next to the collection name, and click **Edit collection**.
|
||||
4. Add or remove products from the collection, and then click **Done**.
|
||||
|
||||
You can also add an app to a collection from the app details page.
|
||||
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||
2. Click **Manage**, and then click **Products & services**.
|
||||
3. Under **Apps & software**, choose an app you want to include in a new collection.
|
||||
|
@ -45,7 +45,7 @@ You'll need to set up:
|
||||
- LOB publishers need to have an app in Microsoft Store, or have an app ready to submit to the Store.
|
||||
|
||||
The process and timing look like this:
|
||||

|
||||

|
||||
|
||||
## <a href="" id="add-lob-publisher"></a>Add an LOB publisher (Admin)
|
||||
Admins need to invite developer or ISVs to become an LOB publisher.
|
||||
|
@ -861,7 +861,7 @@ Here's the list of corresponding Group Policy settings in HKLM\\Software\\Polici
|
||||
|DeferFeatureUpdates|REG_DWORD|1: defer feature updates<br><br>Other value or absent: don’t defer feature updates|
|
||||
|DeferFeatureUpdatesPeriodInDays|REG_DWORD|0-180: days to defer feature updates|
|
||||
|PauseFeatureUpdates|REG_DWORD|1: pause feature updates<br><br>Other value or absent: don’t pause feature updates|
|
||||
|ExcludeWUDriversInQualityUpdate|REG_DWORD|1: exclude WU drivers<br><br>Other value or absent: offer WU drivers|
|
||||
|ExcludeWUDriversInQualityUpdate|REG_DWORD|1: exclude Windows Update drivers<br><br>Other value or absent: offer Windows Update drivers|
|
||||
|
||||
Here's the list of older policies that are still supported for backward compatibility. You can use these older policies for Windows 10, version 1511 devices.
|
||||
|
||||
|
@ -496,7 +496,7 @@ The status error mapping is listed below.
|
||||
|--- |--- |
|
||||
|0|Success|
|
||||
|1|Failure: invalid PFN|
|
||||
|2|Failure: invalid or expired device authentication with MSA|
|
||||
|2|Failure: invalid or expired device authentication with Microsoft account|
|
||||
|3|Failure: WNS client registration failed due to an invalid or revoked PFN|
|
||||
|4|Failure: no Channel URI assigned|
|
||||
|5|Failure: Channel URI has expired|
|
||||
|
@ -64,12 +64,12 @@ manager: dansimp
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Specifies whether user is allowed to add non-MSA email accounts.
|
||||
Specifies whether user is allowed to add email accounts other than Microsoft account.
|
||||
|
||||
Most restricted value is 0.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy will only block UI/UX-based methods for adding non-Microsoft accounts.
|
||||
> This policy will only block UI/UX-based methods for adding non-Microsoft accounts.
|
||||
|
||||
<!--/Description-->
|
||||
<!--SupportedValues-->
|
||||
@ -109,7 +109,7 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services.
|
||||
Specifies whether the user is allowed to use a Microsoft account for non-email related connection authentication and services.
|
||||
|
||||
Most restricted value is 0.
|
||||
|
||||
@ -154,10 +154,10 @@ The following list shows the supported values:
|
||||
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
||||
|
||||
> [!NOTE]
|
||||
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||
> If the Microsoft account service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||
|
||||
> [!NOTE]
|
||||
> If the MSA service is disabled, the Subscription Activation feature will not work properly and your users will not be able to “step-up” from Windows 10 Pro to Windows 10 Enterprise, because the MSA ticket for license authentication cannot be generated. The machine will remain on Windows 10 Pro and no error will be displayed in the Activation Settings app.
|
||||
> If the Microsoft account service is disabled, the Subscription Activation feature will not work properly and your users will not be able to “step-up” from Windows 10 Pro to Windows 10 Enterprise, because the Microsoft account ticket for license authentication cannot be generated. The machine will remain on Windows 10 Pro and no error will be displayed in the Activation Settings app.
|
||||
|
||||
<!--/Description-->
|
||||
<!--SupportedValues-->
|
||||
|
@ -106,7 +106,7 @@ On a device where this policy is configured, the user specified in the policy wi
|
||||
> [!NOTE]
|
||||
>
|
||||
> - Some events such as major OS updates may require the specified user to logon to the device again to resume auto-logon behavior.
|
||||
> - Auto-logon is only supported for MSA and AAD users.
|
||||
> - Auto-logon is only supported for Microsoft account and AAD users.
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<hr/>
|
||||
|
@ -25,7 +25,7 @@ All that's required to use Quick Assist is suitable network and internet connect
|
||||
|
||||
### Authentication
|
||||
|
||||
The helper can authenticate when they sign in by using a Microsoft Account (MSA) or Azure Active Directory (Azure AD). Local Active Directory authentication isn't currently supported.
|
||||
The helper can authenticate when they sign in by using a Microsoft account (MSA) or Azure Active Directory (Azure AD). Local Active Directory authentication isn't currently supported.
|
||||
|
||||
### Network considerations
|
||||
|
||||
@ -36,7 +36,7 @@ Both the helper and sharer must be able to reach these endpoints over port 443:
|
||||
| Domain/Name | Description |
|
||||
|--|--|
|
||||
| `*.support.services.microsoft.com` | Primary endpoint used for Quick Assist application |
|
||||
| `*.login.microsoftonline.com` | Required for logging in to the application (MSA) |
|
||||
| `*.login.microsoftonline.com` | Required for logging in to the application (Microsoft account) |
|
||||
| `*.channelwebsdks.azureedge.net` | Used for chat services within Quick Assist |
|
||||
| `*.aria.microsoft.com` | Used for accessibility features within the app |
|
||||
| `*.api.support.microsoft.com` | API access for Quick Assist |
|
||||
|
@ -15,7 +15,7 @@ ms.topic: troubleshooting
|
||||
|
||||
# What version of Windows am I running?
|
||||
|
||||
To determine if your device is enrolled in the [Long-Term Servicing Channel](/windows/deployment/update/waas-overview#servicing-channels) (LTSC, formerly LTSB) or the [General Availability Channel](/windows/deployment/update/waas-overview#servicing-channels) (SAC) you'll need to know what version of Windows 10 you're running. There are a few ways to figure this out. Each method provides a different set of details, so it’s useful to learn about all of them.
|
||||
To determine if your device is enrolled in the [Long-Term Servicing Channel](/windows/deployment/update/waas-overview#servicing-channels) (LTSC, formerly LTSB) or the [General Availability Channel](/windows/deployment/update/waas-overview#servicing-channels) (GA Channel) you'll need to know what version of Windows 10 you're running. There are a few ways to figure this out. Each method provides a different set of details, so it’s useful to learn about all of them.
|
||||
|
||||
## System Properties
|
||||
Click **Start** > **Settings** > **System** > click **About** from the bottom of the left-hand menu
|
||||
|
@ -41,9 +41,9 @@ The following table lists the minimum Windows 10 version that supports Delivery
|
||||
|
||||
| Device type | Minimum Windows version
|
||||
|------------------|---------------|
|
||||
| Computers running Windows 10 | Win 10 1511 |
|
||||
| Computers running Windows 10 | Windows 10 1511 |
|
||||
| Computers running Server Core installations of Windows Server | Windows Server 2019 |
|
||||
| Windows IoT devices | Win 10 1803 |
|
||||
| Windows IoT devices | Windows 10 1803 |
|
||||
|
||||
### Types of download content supported by Delivery Optimization
|
||||
|
||||
@ -51,19 +51,19 @@ The following table lists the minimum Windows 10 version that supports Delivery
|
||||
|
||||
| Windows Client | Minimum Windows version | HTTP Downloader | Peer to Peer | Microsoft Connected Cache (MCC)
|
||||
|------------------|---------------|----------------|----------|----------------|
|
||||
| Windows Update (feature updates quality updates, language packs, drivers) | Win 10 1511, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows 10 Store files | Win 10 1511, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows 10 Store for Business files | Win 10 1511, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows Defender definition updates | Win 10 1511, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Intune Win32 apps| Win 10 1709, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Microsoft 365 Apps and updates | Win 10 1709, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Edge Browser Updates | Win 10 1809, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Configuration Manager Express updates| Win 10 1709 + Configuration Manager version Win 10 1711, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Dynamic updates| Win 10 1903, Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| MDM Agent | Win 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Xbox Game Pass (PC) | Win 10 1809, Win 11 | :heavy_check_mark: | | :heavy_check_mark: |
|
||||
| Windows Package Manager| Win 10 1809, Win 11 | :heavy_check_mark: | | |
|
||||
| MSIX | Win 10 2004, Win 11 | :heavy_check_mark: | | |
|
||||
| Windows Update (feature updates quality updates, language packs, drivers) | Windows 10 1511, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows 10 Store files | Windows 10 1511, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows 10 Store for Business files | Windows 10 1511, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Windows Defender definition updates | Windows 10 1511, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Intune Win32 apps| Windows 10 1709, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Microsoft 365 Apps and updates | Windows 10 1709, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Edge Browser Updates | Windows 10 1809, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Configuration Manager Express updates| Windows 10 1709 + Configuration Manager version Windows 10 1711, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Dynamic updates| Windows 10 1903, Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| MDM Agent | Windows 11 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
|
||||
| Xbox Game Pass (PC) | Windows 10 1809, Windows 11 | :heavy_check_mark: | | :heavy_check_mark: |
|
||||
| Windows Package Manager| Windows 10 1809, Windows 11 | :heavy_check_mark: | | |
|
||||
| MSIX | Windows 10 2004, Windows 11 | :heavy_check_mark: | | |
|
||||
|
||||
#### Windows Server
|
||||
|
||||
|
@ -99,7 +99,7 @@ For Windows Update (WU) scans URLs that are used for update detection ([MS-WUSP]
|
||||
> [!Note]
|
||||
> For intranet WSUS update service URLs, we provide an option via Windows Update policy to select the proxy behavior.
|
||||
|
||||
For WU URLs that _aren't_ used for update detection, such as for download or reporting:
|
||||
For Windows Update URLs that _aren't_ used for update detection, such as for download or reporting:
|
||||
- User proxy is attempted.
|
||||
- If WUA fails to reach the service due to a certain proxy, service, or authentication error code, then the system proxy is attempted.
|
||||
|
||||
@ -116,7 +116,7 @@ For WU URLs that _aren't_ used for update detection, such as for download or rep
|
||||
|
||||
|Service|ServiceId|
|
||||
|-------|---------|
|
||||
|Unspecified / Default|WU, MU, or WSUS <br>00000000-0000-0000-0000-000000000000 |
|
||||
|Unspecified / Default|Windows Update, Microsoft Update, or WSUS <br>00000000-0000-0000-0000-000000000000 |
|
||||
|Windows Update|9482F4B4-E343-43B6-B170-9A65BC822C77|
|
||||
|Microsoft Update|7971f918-a847-4430-9279-4a52d1efe18d|
|
||||
|Store|855E8A7C-ECB4-4CA3-B045-1DFA50104289|
|
||||
|
@ -45,8 +45,8 @@ This section lists the error codes for Microsoft Windows Update.
|
||||
| 0x80243002 | `WU_E_INSTALLATION_RESULTS_INVALID_DATA` | The results of download and installation could not be read from the registry due to an invalid data format. |
|
||||
| 0x80243003 | `WU_E_INSTALLATION_RESULTS_NOT_FOUND` | The results of download and installation are not available; the operation may have failed to start. |
|
||||
| 0x80243004 | `WU_E_TRAYICON_FAILURE` | A failure occurred when trying to create an icon in the taskbar notification area. |
|
||||
| 0x80243FFD | `WU_E_NON_UI_MODE` | Unable to show UI when in non-UI mode; WU client UI modules may not be installed. |
|
||||
| 0x80243FFE | `WU_E_WUCLTUI_UNSUPPORTED_VERSION` | Unsupported version of WU client UI exported functions. |
|
||||
| 0x80243FFD | `WU_E_NON_UI_MODE` | Unable to show UI when in non-UI mode; Windows Update client UI modules may not be installed. |
|
||||
| 0x80243FFE | `WU_E_WUCLTUI_UNSUPPORTED_VERSION` | Unsupported version of Windows Update client UI exported functions. |
|
||||
| 0x80243FFF | `WU_E_AUCLIENT_UNEXPECTED` | There was a user interface error not covered by another `WU_E_AUCLIENT_*` error code. |
|
||||
| 0x8024043D | `WU_E_SERVICEPROP_NOTAVAIL` | The requested service property is not available. |
|
||||
|
||||
|
@ -47,8 +47,8 @@ To understand the changes to the Windows Update architecture that UUP introduces
|
||||
>
|
||||
>Store apps aren't installed by USO, today they are separate.
|
||||
|
||||
- **WU Client/ UpdateAgent** - The component running on your PC. It's essentially a DLL that is downloaded to the device when an update is applicable. It surfaces the APIs needed to perform an update, including those needed to generate a list of payloads to download, as well as starts stage and commit operations. It provides a unified interface that abstracts away the underlying update technologies from the caller.
|
||||
- **WU Arbiter handle**- Code that is included in the UpdateAgent binary. The arbiter gathers information about the device, and uses the CompDB(s) to output an action list. It is responsible for determining the final "composition state" of your device, and which payloads (like ESDs or packages) are needed to get your device up to date.
|
||||
- **Windows Update Client/ UpdateAgent** - The component running on your PC. It's essentially a DLL that is downloaded to the device when an update is applicable. It surfaces the APIs needed to perform an update, including those needed to generate a list of payloads to download, as well as starts stage and commit operations. It provides a unified interface that abstracts away the underlying update technologies from the caller.
|
||||
- **Windows Update Arbiter handle**- Code that is included in the UpdateAgent binary. The arbiter gathers information about the device, and uses the CompDB(s) to output an action list. It is responsible for determining the final "composition state" of your device, and which payloads (like ESDs or packages) are needed to get your device up to date.
|
||||
- **Deployment Arbiter**- A deployment manager that calls different installers. For example, CBS.
|
||||
|
||||
Additional components include the following-
|
||||
|
@ -42,7 +42,7 @@ The following table describes some log files and how to use them for troubleshoo
|
||||
|setupact.log|Post-upgrade (after OOBE):<br>Windows\Panther|Contains information about setup actions during the installation.|Investigate post-upgrade related issues.|
|
||||
|setuperr.log|Same as setupact.log|Contains information about setup errors during the installation.|Review all errors encountered during the installation phase.|
|
||||
|miglog.xml|Post-upgrade (after OOBE):<br>Windows\Panther|Contains information about what was migrated during the installation.|Identify post upgrade data migration issues.|
|
||||
|BlueBox.log|Down-Level:<br>Windows\Logs\Mosetup|Contains information communication between setup.exe and Windows Update.|Use during WSUS and WU down-level failures or for 0xC1900107.|
|
||||
|BlueBox.log|Down-Level:<br>Windows\Logs\Mosetup|Contains information communication between setup.exe and Windows Update.|Use during WSUS and Windows Update down-level failures or for 0xC1900107.|
|
||||
|Supplemental rollback logs:<br>Setupmem.dmp<br>setupapi.dev.log<br>Event logs (*.evtx)|$Windows.~BT\Sources\Rollback|Additional logs collected during rollback.|Setupmem.dmp: If OS bug checks during upgrade, setup will attempt to extract a mini-dump.<br>Setupapi: Device install issues - 0x30018<br>Event logs: Generic rollbacks (0xC1900101) or unexpected reboots.|
|
||||
|
||||
## Log entry structure
|
||||
|
@ -189,5 +189,5 @@ Also see the following sequential list of modern setup (mosetup) error codes wit
|
||||
- [Windows 10 Specifications](https://www.microsoft.com/windows/Windows-10-specifications)
|
||||
- [Windows 10 IT pro forums](https://social.technet.microsoft.com/Forums/home?category=Windows10ITPro)
|
||||
- [Fix Windows Update errors by using the DISM or System Update Readiness tool](/troubleshoot/windows-server/deployment/fix-windows-update-errors)
|
||||
- [Win 7 to Win 10 upgrade error (0x800707E7 - 0x3000D)](https://answers.microsoft.com/en-us/windows/forum/all/win-7-to-win-10-upgrade-error-0x800707e7-0x3000d/1273bc1e-8a04-44d4-a6b2-808c9feeb020))
|
||||
- [Win 10 upgrade error: User profile suffix mismatch, 0x800707E7 - 0x3000D](https://answers.microsoft.com/en-us/windows/forum/windows_10-windows_install/win-10-upgrade-error-user-profile-suffix-mismatch/0f006733-2af5-4b42-a2d4-863fad05273d?page=3)
|
||||
- [Windows 7 to Windows 10 upgrade error (0x800707E7 - 0x3000D)](https://answers.microsoft.com/en-us/windows/forum/all/win-7-to-win-10-upgrade-error-0x800707e7-0x3000d/1273bc1e-8a04-44d4-a6b2-808c9feeb020))
|
||||
- [Windows 10 upgrade error: User profile suffix mismatch, 0x800707E7 - 0x3000D](https://answers.microsoft.com/en-us/windows/forum/windows_10-windows_install/win-10-upgrade-error-user-profile-suffix-mismatch/0f006733-2af5-4b42-a2d4-863fad05273d?page=3)
|
||||
|
@ -298,7 +298,7 @@ Each rule name and its associated unique rule identifier are listed with a descr
|
||||
39. WimApplyExtractFailure – 746879E9-C9C5-488C-8D4B-0C811FF3A9A8
|
||||
- Matches a wim apply failure during wim extraction phases of setup. Will output the extension, path and error code.
|
||||
40. UpdateAgentExpanderFailure – 66E496B3-7D19-47FA-B19B-4040B9FD17E2
|
||||
- Matches DPX expander failures in the down-level phase of update from WU. Will output the package name, function, expression and error code.
|
||||
- Matches DPX expander failures in the down-level phase of update from Windows Update. Will output the package name, function, expression and error code.
|
||||
41. FindFatalPluginFailure – E48E3F1C-26F6-4AFB-859B-BF637DA49636
|
||||
- Matches any plug-in failure that setupplatform decides is fatal to setup. Will output the plugin name, operation and error code.
|
||||
42. AdvancedInstallerFailed - 77D36C96-32BE-42A2-BB9C-AAFFE64FCADC
|
||||
|
@ -57,15 +57,15 @@ X = unsupported <BR>
|
||||
| **Home > Pro for Workstations** |  |  |  |  |  |  |
|
||||
| **Home > Pro Education** |  |  |  |  |  |  |
|
||||
| **Home > Education** |  |  |  |  |  |  |
|
||||
| **Pro > Pro for Workstations** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro > Pro Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro > Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro > Enterprise** |  |  |  |  <br>(1703 - PC)<br>(1709 - MSfB) |  |  |
|
||||
| **Pro for Workstations > Pro Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro for Workstations > Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro for Workstations > Enterprise** |  |  |  |  <br>(1703 - PC)<br>(1709 - MSfB) |  |  |
|
||||
| **Pro Education > Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Enterprise > Education** |  |  |  |  <br>(MSfB) |  |  |
|
||||
| **Pro > Pro for Workstations** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Pro > Pro Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Pro > Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Pro > Enterprise** |  |  |  |  <br>(1703 - PC)<br>(1709 - Microsoft Store for Business) |  |  |
|
||||
| **Pro for Workstations > Pro Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Pro for Workstations > Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Pro for Workstations > Enterprise** |  |  |  |  <br>(1703 - PC)<br>(1709 - Microsoft Store for Business) |  |  |
|
||||
| **Pro Education > Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
| **Enterprise > Education** |  |  |  |  <br>(Microsoft Store for Business) |  |  |
|
||||
|
||||
> [!NOTE]
|
||||
> - For information about upgrade paths in Windows 10 in S mode (for Pro or Education), check out [Windows 10 Pro/Enterprise in S mode](../windows-10-pro-in-s-mode.md)
|
||||
|
@ -30,7 +30,7 @@ If you are also migrating to a different edition of Windows, see [Windows 10 edi
|
||||
|
||||
- **In-place upgrade from Windows 7, Windows 8.1, or [Windows 10 General Availability Channel](/windows/release-health/release-information)** to Windows 10 LTSC is not supported. Windows 10 LTSC 2015 did not block this in-place upgrade path. This issue was corrected in the Windows 10 LTSC 2016 release, which only allows data-only and clean install options.
|
||||
|
||||
You can upgrade from Windows 10 LTSC to Windows 10 General Availability Channel, provided that you upgrade to the same or a newer build version. For example, Windows 10 Enterprise 2016 LTSB can be upgraded to Windows 10 Enterprise version 1607 or later. Upgrade is supported using the in-place upgrade process (using Windows setup). You will need to use the Product Key switch if you want to keep your apps. If you don't use the switch, the option **Keep personal files and apps** option is grayed out. The command line would be `setup.exe /pkey xxxxx-xxxxx-xxxxx-xxxxx-xxxxx`, using your relevant Windows 10 SAC product key. For example, if using a KMS, the command line would be `setup.exe /pkey NPPR9-FWDCX-D2C8J-H872K-2YT43`.
|
||||
You can upgrade from Windows 10 LTSC to Windows 10 General Availability Channel, provided that you upgrade to the same or a newer build version. For example, Windows 10 Enterprise 2016 LTSB can be upgraded to Windows 10 Enterprise version 1607 or later. Upgrade is supported using the in-place upgrade process (using Windows setup). You will need to use the Product Key switch if you want to keep your apps. If you don't use the switch, the option **Keep personal files and apps** option is grayed out. The command line would be `setup.exe /pkey xxxxx-xxxxx-xxxxx-xxxxx-xxxxx`, using your relevant Windows 10 GA Channel product key. For example, if using a KMS, the command line would be `setup.exe /pkey NPPR9-FWDCX-D2C8J-H872K-2YT43`.
|
||||
|
||||
- **Windows N/KN**: Windows "N" and "KN" SKUs (editions without media-related functionality) follow the same upgrade paths shown below. If the pre-upgrade and post-upgrade editions are not the same type (e.g. Windows 8.1 Pro N to Windows 10 Pro), personal data will be kept but applications and settings will be removed during the upgrade process.
|
||||
|
||||
|
@ -396,7 +396,7 @@ For the purposes of this demo, select **All** under the **MDM user scope** and s
|
||||
|
||||
## Register your VM
|
||||
|
||||
Your VM (or device) can be registered either via Intune or Microsoft Store for Business (MSfB). Both processes are shown here, but *only pick one* for the purposes of this lab. It's highly recommended that you use Intune rather than MSfB.
|
||||
Your VM (or device) can be registered either via Intune or Microsoft Store for Business (MSfB). Both processes are shown here, but *only pick one* for the purposes of this lab. It's highly recommended that you use Intune rather than Microsoft Store for Business.
|
||||
|
||||
### Autopilot registration using Intune
|
||||
|
||||
@ -430,7 +430,7 @@ Optional: see the following video for an overview of the process.
|
||||
|
||||
> [!video https://www.youtube.com/embed/IpLIZU_j7Z0]
|
||||
|
||||
First, you need a MSfB account. You can use the same one you created above for Intune, or follow [these instructions](/microsoft-store/windows-store-for-business-overview) to create a new one.
|
||||
First, you need a Microsoft Store for Business account. You can use the same one you created above for Intune, or follow [these instructions](/microsoft-store/windows-store-for-business-overview) to create a new one.
|
||||
|
||||
Next, to sign in to [Microsoft Store for Business](https://businessstore.microsoft.com/en-us/store) with your test account, select **Sign in** on the upper-right-corner of the main page.
|
||||
|
||||
@ -445,16 +445,16 @@ Select the **Add devices** link to upload your CSV file. A message appears that
|
||||
## Create and assign a Windows Autopilot deployment profile
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Autopilot profiles can be created and assigned to your registered VM or device either through Intune or MSfB. Both processes are shown here, but only *pick one for the purposes of this lab*:
|
||||
> Autopilot profiles can be created and assigned to your registered VM or device either through Intune or Microsoft Store for Business. Both processes are shown here, but only *pick one for the purposes of this lab*:
|
||||
|
||||
Pick one:
|
||||
- [Create profiles using Intune](#create-a-windows-autopilot-deployment-profile-using-intune)
|
||||
- [Create profiles using MSfB](#create-a-windows-autopilot-deployment-profile-using-msfb)
|
||||
- [Create profiles using Microsoft Store for Business](#create-a-windows-autopilot-deployment-profile-using-msfb)
|
||||
|
||||
### Create a Windows Autopilot deployment profile using Intune
|
||||
|
||||
> [!NOTE]
|
||||
> Even if you registered your device in MSfB, it still appears in Intune. Although, you might have to **sync** and then **refresh** your device list.
|
||||
> Even if you registered your device in Microsoft Store for Business, it still appears in Intune. Although, you might have to **sync** and then **refresh** your device list.
|
||||
|
||||

|
||||
|
||||
@ -533,13 +533,13 @@ Select **OK**, and then select **Create**.
|
||||
|
||||
If you already created and assigned a profile via Intune with the steps immediately above, then skip this section.
|
||||
|
||||
A [video](https://www.youtube.com/watch?v=IpLIZU_j7Z0) is available that covers the steps required to create and assign profiles in MSfB. These steps are also summarized below.
|
||||
A [video](https://www.youtube.com/watch?v=IpLIZU_j7Z0) is available that covers the steps required to create and assign profiles in Microsoft Store for Business. These steps are also summarized below.
|
||||
|
||||
First, sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/manage/dashboard) using the Intune account you initially created for this lab.
|
||||
|
||||
Select **Manage** from the top menu, then select **Devices** from the left navigation tree.
|
||||
|
||||

|
||||

|
||||
|
||||
Select the **Windows Autopilot Deployment Program** link in the **Devices** tile.
|
||||
|
||||
@ -548,17 +548,17 @@ To CREATE the profile:
|
||||
Select your device from the **Devices** list:
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
On the Autopilot deployment dropdown menu, select **Create new profile**:
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
Name the profile, choose your desired settings, and then select **Create**:
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
The new profile is added to the Autopilot deployment list.
|
||||
|
||||
@ -567,12 +567,12 @@ To ASSIGN the profile:
|
||||
To assign (or reassign) the profile to a device, select the checkboxes next to the device you registered for this lab. Then, select the profile you want to assign from the **Autopilot deployment** dropdown menu, as shown:
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
To confirm the profile was successfully assigned to the intended device, check the contents of the **Profile** column:
|
||||
|
||||
> [!div class="mx-imgBorder"]
|
||||
> 
|
||||
> 
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The new profile is only applied if the device hasn't started and gone through OOBE. Settings from a different profile can't be applied when another profile has been applied. Windows would need to be reinstalled on the device for the second profile to be applied to the device.
|
||||
@ -609,7 +609,7 @@ Windows Autopilot takes over to automatically join your device into Azure AD and
|
||||
|
||||
## Remove devices from Autopilot
|
||||
|
||||
To use the device (or VM) for other purposes after completion of this lab, you need to remove (deregister) it from Autopilot via either Intune or MSfB, and then reset it. Instructions for deregistering devices can be found at [Enroll Windows devices in Intune by using Windows Autopilot](/intune/enrollment-autopilot#create-an-autopilot-device-group), [Remove devices by using wipe, retire, or manually unenrolling the device](/intune/devices-wipe#delete-devices-from-the-azure-active-directory-portal), and below.
|
||||
To use the device (or VM) for other purposes after completion of this lab, you need to remove (deregister) it from Autopilot via either Intune or Microsoft Store for Business, and then reset it. Instructions for deregistering devices can be found at [Enroll Windows devices in Intune by using Windows Autopilot](/intune/enrollment-autopilot#create-an-autopilot-device-group), [Remove devices by using wipe, retire, or manually unenrolling the device](/intune/devices-wipe#delete-devices-from-the-azure-active-directory-portal), and below.
|
||||
|
||||
### Delete (deregister) Autopilot device
|
||||
|
||||
|
@ -1584,9 +1584,9 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
@ -4281,7 +4281,7 @@ The following fields are available:
|
||||
- **DeviceModel** What is the device model.
|
||||
- **DeviceOEM** What OEM does this device belong to.
|
||||
- **DownloadPriority** The priority of the download activity.
|
||||
- **DownloadScenarioId** A unique ID for a given download used to tie together WU and DO events.
|
||||
- **DownloadScenarioId** A unique ID for a given download used to tie together Windows Update and DO events.
|
||||
- **DriverPingBack** Contains information about the previous driver and system state.
|
||||
- **Edition** Indicates the edition of Windows being used.
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
|
@ -1681,9 +1681,9 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update(WU) updates to other devices on the same network.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
|
@ -1829,9 +1829,9 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
@ -6126,7 +6126,7 @@ This event sends data regarding OS Updates and Upgrades from Windows 7.X, Window
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **HostOSBuildNumber** The build number of the previous operating system.
|
||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system).
|
||||
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
||||
@ -8188,7 +8188,7 @@ This event sends data specific to the FixAppXReparsePoints mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||
@ -8210,7 +8210,7 @@ This event sends data specific to the FixupEditionId mitigation used for OS upda
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **EditionIdUpdated** Determine whether EditionId was changed.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
|
@ -2574,9 +2574,9 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
@ -4236,7 +4236,7 @@ The following fields are available:
|
||||
- **FlightId** The ID of the Windows Insider build the device received.
|
||||
- **InstallDate** The date the driver was installed.
|
||||
- **InstallFlags** The driver installation flags.
|
||||
- **OptionalData** Metadata specific to WU (Windows Update) associated with the driver (flight IDs, recovery IDs, etc.)
|
||||
- **OptionalData** Metadata specific to Windows Update (WU) associated with the driver (flight IDs, recovery IDs, etc.)
|
||||
- **RebootRequired** Indicates whether a reboot is required after the installation.
|
||||
- **RollbackPossible** Indicates whether this driver can be rolled back.
|
||||
- **WuTargetedHardwareId** Indicates that the driver was installed because the device hardware ID was targeted by the Windows Update.
|
||||
@ -7554,7 +7554,7 @@ This event sends data regarding OS Updates and Upgrades from Windows 7.X, Window
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **HostOSBuildNumber** The build number of the previous operating system.
|
||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system).
|
||||
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
||||
@ -9816,7 +9816,7 @@ This event sends data specific to the FixAppXReparsePoints mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||
@ -9838,7 +9838,7 @@ This event sends data specific to the FixupEditionId mitigation used for OS upda
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **EditionIdUpdated** Determine whether EditionId was changed.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
@ -9861,7 +9861,7 @@ This event sends data specific to the FixupWimmountSysPath mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **ImagePathDefault** Default path to wimmount.sys driver defined in the system registry.
|
||||
- **ImagePathFixedup** Boolean indicating whether the wimmount.sys driver path was fixed by this mitigation.
|
||||
|
@ -2775,10 +2775,10 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WULCUVersion** Version of the LCU Installed on the machine.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
@ -4337,7 +4337,7 @@ The following fields are available:
|
||||
- **FlightId** The ID of the Windows Insider build the device received.
|
||||
- **InstallDate** The date the driver was installed.
|
||||
- **InstallFlags** The driver installation flags.
|
||||
- **OptionalData** Metadata specific to WU (Windows Update) associated with the driver (flight IDs, recovery IDs, etc.)
|
||||
- **OptionalData** Metadata specific to Windows Update (WU) associated with the driver (flight IDs, recovery IDs, etc.)
|
||||
- **RebootRequired** Indicates whether a reboot is required after the installation.
|
||||
- **RollbackPossible** Indicates whether this driver can be rolled back.
|
||||
- **WuTargetedHardwareId** Indicates that the driver was installed because the device hardware ID was targeted by the Windows Update.
|
||||
@ -7722,7 +7722,7 @@ This event sends data regarding OS Updates and Upgrades from Windows 7.X, Window
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **HostOSBuildNumber** The build number of the previous operating system.
|
||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system).
|
||||
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
||||
@ -9395,7 +9395,7 @@ The following fields are available:
|
||||
|
||||
- **updaterCmdLine** The command line requested by the updater.
|
||||
- **updaterId** The ID of the updater that requested the work.
|
||||
- **wuDeviceid** WU device ID.
|
||||
- **wuDeviceid** Windows Update device ID.
|
||||
|
||||
|
||||
### Microsoft.Windows.Update.Orchestrator.UniversalOrchestratorScheduleWorkNonSystem
|
||||
@ -9840,7 +9840,7 @@ This event sends data specific to the FixAppXReparsePoints mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||
@ -9862,7 +9862,7 @@ This event sends data specific to the FixupEditionId mitigation used for OS upda
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **EditionIdUpdated** Determine whether EditionId was changed.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
@ -9885,7 +9885,7 @@ This event sends data specific to the FixupWimmountSysPath mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **ImagePathDefault** Default path to wimmount.sys driver defined in the system registry.
|
||||
- **ImagePathFixedup** Boolean indicating whether the wimmount.sys driver path was fixed by this mitigation.
|
||||
|
@ -119,7 +119,7 @@ Collects Office metadata through UTC to compare with equivalent data collected t
|
||||
Applicable to all Win32 applications. Helps us understand the status of the update process of the office suite (Success or failure with error details).
|
||||
|
||||
- **build:** App version
|
||||
- **channel:** Is this part of SAC or SAC-T?
|
||||
- **channel:** Is this part of GA Channel or SAC-T?
|
||||
- **errorCode:** What error occurred during the upgrade process?
|
||||
- **errorMessage:** what was the error message during the upgrade process?
|
||||
- **status:** Was the upgrade successful or not?
|
||||
|
@ -2292,10 +2292,10 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WULCUVersion** Version of the LCU Installed on the machine.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
@ -6022,7 +6022,7 @@ This event sends data regarding OS Updates and Upgrades from Windows 7.X, Window
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **HostOSBuildNumber** The build number of the previous operating system.
|
||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system).
|
||||
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
||||
@ -6789,7 +6789,7 @@ The following fields are available:
|
||||
- **freeDiskSpaceInMB** Amount of free disk space.
|
||||
- **interactive** Informs if this action is caused due to user interaction.
|
||||
- **priority** The CPU and IO priority this action is being performed on.
|
||||
- **provider** The provider that is being invoked to perform this action (WU, Legacy UO Provider etc.).
|
||||
- **provider** The provider that is being invoked to perform this action (Windows Update , Legacy UO Provider etc.).
|
||||
- **update** Update related metadata including UpdateId.
|
||||
- **uptimeMinutes** Duration USO for up for in the current boot session.
|
||||
- **wilActivity** Wil Activity related information.
|
||||
@ -6988,7 +6988,7 @@ The following fields are available:
|
||||
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0.
|
||||
- **DeferralPolicySources** Sources for any update deferral policies defined (GPO = 0x10, MDM = 0x100, Flight = 0x1000, UX = 0x10000).
|
||||
- **DeferredUpdates** UpdateIds which are currently being deferred until a later time.
|
||||
- **DriverExclusionPolicy** Indicates if policy for not including drivers with WU updates is enabled.
|
||||
- **DriverExclusionPolicy** Indicates if policy for not including drivers with Windows Update (WU) updates is enabled.
|
||||
- **DriverSyncPassPerformed** A flag indicating whether the driver sync is performed in a update scan.
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **ExcludedUpdateClasses** Update classifications being excluded via policy.
|
||||
@ -8139,7 +8139,7 @@ This event sends data specific to the FixAppXReparsePoints mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **InstanceId** Unique GUID that identifies each instances of setuphost.exe.
|
||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||
@ -8161,7 +8161,7 @@ This event sends data specific to the FixupWimmountSysPath mitigation used for O
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ClientId** In the WU scenario, this will be the WU client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **ClientId** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||
- **FlightId** Unique identifier for each flight.
|
||||
- **ImagePathDefault** Default path to wimmount.sys driver defined in the system registry.
|
||||
- **ImagePathFixedup** Boolean indicating whether the wimmount.sys driver path was fixed by this mitigation.
|
||||
|
@ -2305,10 +2305,10 @@ The following fields are available:
|
||||
- **UpdateServiceURLConfigured** Retrieves if the device is managed by Windows Server Update Services (WSUS).
|
||||
- **WUDeferUpdatePeriod** Retrieves if deferral is set for Updates.
|
||||
- **WUDeferUpgradePeriod** Retrieves if deferral is set for Upgrades.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded WU updates to other devices on the same network.
|
||||
- **WUDODownloadMode** Retrieves whether DO is turned on and how to acquire/distribute updates Delivery Optimization (DO) allows users to deploy previously downloaded Windows Update (WU) updates to other devices on the same network.
|
||||
- **WULCUVersion** Version of the LCU Installed on the machine.
|
||||
- **WUMachineId** Retrieves the Windows Update (WU) Machine Identifier.
|
||||
- **WUPauseState** Retrieves WU setting to determine if updates are paused.
|
||||
- **WUPauseState** Retrieves Windows Update setting to determine if updates are paused.
|
||||
- **WUServer** Retrieves the HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default).
|
||||
|
||||
|
||||
|
@ -30,9 +30,9 @@ This topic provides links to articles with information about what's new in each
|
||||
|
||||
## The Long-Term Servicing Channel (LTSC)
|
||||
|
||||
The following table summarizes equivalent feature update versions of Windows 10 LTSC and General Availability Channel (SAC) releases.
|
||||
The following table summarizes equivalent feature update versions of Windows 10 LTSC and General Availability Channel (GA Channel) releases.
|
||||
|
||||
| LTSC release | Equivalent SAC release | Availability date |
|
||||
| LTSC release | Equivalent GA Channel release | Availability date |
|
||||
| --- | --- | --- |
|
||||
| Windows 10 Enterprise LTSC 2015 | Windows 10, Version 1507 | 7/29/2015 |
|
||||
| Windows 10 Enterprise LTSC 2016 | Windows 10, Version 1607 | 8/2/2016 |
|
||||
|
Loading…
x
Reference in New Issue
Block a user